Cloud-Native Security

5 Surprising Uses for Docker Debug
Beyond troubleshooting, the Debug command can help improve the performance and resource utilization of Docker containers ...

Managing SQL Server High Availability in Kubernetes
SQL Server is not the most obvious choice when it comes to Kubernetes containerization projects. But maybe it should be ...

Amazon EKS Security: A Practical Guide
Amazon EKS allows developers to deploy, manage and scale containerized applications using Kubernetes ...

How to Successfully Migrate to Kubernetes
When you’re undertaking a Kubernetes migration, there are several ways for platform engineers to minimize potential risks and enable development teams from the beginning ...

Uptycs Deepens CNAPP Support for Kubernetes
Uptycs' CNAPP now has the ability to detect and highlight Kubernetes security issues and misconfigurations using the Goat playground ...

Cerbos Managed Authorization Service Leverages Wasm
Cerbos announced today that its Cerbos Hub managed service based on open source authorization software is now available in beta ...

CloudBees Brings Modern DevSecOps Platform to Amazon EKS
CloudBees' recently unveiled DevSecOps platform is now generally available on the Amazon Elastic Kubernetes Service (Amazon EKS) ...

Cloud-Native AI Workloads: Scalability, Sustainability and Security
Confidential computing, special instructions and hardware, in combination with projects such as KEDA and Kepler, can provide scalability, sustainability and security ...

Chkk Launches Platform to Maximize Kubernetes Availability
Chkk emerged from stealth to launch a Kubernetes Availability Platform that identifies and prioritizes availability risks before incidents occur ...

Kubernetes Data Protection In the Age of Namespace-as-a-Service
IT shops increasingly want to share their shiny new Kubernetes clusters among disparate groups of users using namespace-as-a-service (NaaS) ...